Search For:

Displaying 1-30 out of 30 total
Body Sensors: Wireless Access to Physiological Data
Found in: IEEE Software
By Andrew D. Jurik, Alfred C. Weaver
Issue Date:January 2009
pp. 71-73
Embedded devices that sense physiological data have existed for some time but have gained renewed interest as a result of the effects of Moore's Law and the proliferation of wireless radios and interoperable protocols. Applications as diverse as healthcare...
 
Secure Sockets Layer
Found in: Computer
By Alfred C. Weaver
Issue Date:April 2006
pp. 88-90
Understanding how the Secure Sockets Layer works requires reviewing the two cryptographic techniques on which it relies.
 
Remote Medical Monitoring
Found in: Computer
By Andrew D. Jurik, Alfred C. Weaver
Issue Date:April 2008
pp. 96-99
Body network sensors have become lightweight healthcare assistants—they acquire data, run diagnostics, report adverse events, and even warn of unsafe situations.
 
An Empirical Performance Evaluation of Relational Keyword Search Techniques
Found in: IEEE Transactions on Knowledge and Data Engineering
By Joel Coffman,Alfred C. Weaver
Issue Date:January 2014
pp. 30-42
Extending the keyword search paradigm to relational data has been an active area of research within the database and IR community during the past decade. Many approaches have been proposed, but despite numerous publications, there remains a severe lack of ...
 
Fostering Gender Diversity in Computing
Found in: Computer
By Jane Chu Prey,Alfred C. Weaver
Issue Date:March 2013
pp. 22-23
Computing and information technology are among the fastest growing US industries, and participating in efforts to attract and retain a diverse workforce will provide a valuable contribution toward meeting future demands in these professions.
 
The Future of E-Commerce
Found in: Computer
By Alfred C. Weaver, Ronald J. Vetter, Andrew B. Whinston, Kathleen Swigger
Issue Date:October 2000
pp. 30-31
<p>The future of electronic commerce depends on meeting challenges in wireless technology and security. This special issue addresses these challenges and presents innovative ideas to help shape this dynamic, explosive field.</p>
 
Applications of Social Networks and Crowdsourcing for Disaster Management Improvement
Found in: 2013 International Conference on Social Computing (SocialCom)
By Liliya I. Besaleva,Alfred C. Weaver
Issue Date:September 2013
pp. 213-219
Emergency resources are often insufficient to satisfy fully the demands for professional help and supplies after a public disaster. Furthermore, in a mass casualty situation, the emphasis shifts from ensuring the best possible outcome for each individual p...
 
Work in progress -- An interactive, execution-safe system for teaching e-commerce using real-time feedback
Found in: Frontiers in Education, Annual
By William Burns,Alfred C. Weaver
Issue Date:October 2011
pp. S3E-1-S3E-3
An e-commerce sandbox is being developed to supplement a course teaching the technology and business aspects of e-commerce at the University of Virginia. The system consists of a collection of relevant course materials and a sandbox environment for student...
 
Social Networking
Found in: Computer
By Alfred C. Weaver, Benjamin B. Morrison
Issue Date:February 2008
pp. 97-100
The mass adoption of social-networking websites points to an evolution in human social interaction.
 
Hybrid Trust Information Exchange for Federated Systems
Found in: Dependable, Autonomic and Secure Computing, IEEE International Symposium on
By Zhengping Wu, Alfred C. Weaver
Issue Date:September 2007
pp. 125-133
In federated systems, trust management is critical for information sharing and online collaboration. Security tokens provide a way to convey and exchange trust information for security and privacy protection. Although several communication protocols have m...
 
Using Web Services to Exchange Security Tokens for Federated Trust Management
Found in: Web Services, IEEE International Conference on
By Zhengping Wu, Alfred C. Weaver
Issue Date:July 2007
pp. 1176-1178
In federated networks, trust management is critical to information sharing and online collaboration. Security tokens provide a way to convey and exchange trustrelated information for security and privacy purposes. Common users encounter difficulties when t...
 
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
Found in: Computer Software and Applications Conference, Annual International
By Zhengping Wu, Alfred C. Weaver
Issue Date:September 2006
pp. 215-222
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and security for their personal information, they remain uncertain when they have...
 
Bridging Trust Relationships with Web Service Enhancements
Found in: Web Services, IEEE International Conference on
By Zhengping Wu, Alfred C. Weaver
Issue Date:September 2006
pp. 163-169
With the development of web technology and distributed systems, online collaborations are becoming more common and more demanding. Web services now provide standard mechanisms to enable online interactions. Yet security, privacy and trust-related protectio...
 
Biometric Authentication
Found in: Computer
By Alfred C. Weaver
Issue Date:February 2006
pp. 96-97
Biometric authentication is here to stay, and so is the controversy it engenders regarding invasion of privacy.
 
Dynamic Trust Establishment with Privacy Protection for Web Services
Found in: Web Services, IEEE International Conference on
By Zhengping Wu, Alfred C. Weaver
Issue Date:July 2005
pp. 811-812
The lack of effective trust establishment mechanisms for web services impedes the deployment of trust models for online services. One important issue is the lack of privacy protection in trust establishment. Current web service technology encourages a clie...
   
Statistical Characterization of Wide-Area IP Traffic
Found in: Computer Communications and Networks, International Conference on
By Matthew T. Lucas, Dallas E. Wrege, Bert J. Dempsey, Alfred C. Weaver
Issue Date:September 1997
pp. 442
Background traffic models are fundamental to packet-level network simulation since the background traffic impacts packet drop rates, queuing delays, end-to-end delay variation, and also determines available network bandwidth. In this paper, we present a st...
 
Alignment of Authentication Information for Trust Federation
Found in: Enterprise Distributed Object Computing Conference Workshops, IEEE International
By Zhengping Wu, Alfred C. Weaver
Issue Date:October 2007
pp. 73-80
Accelerated by the rapid deployment of distributed systems and the Internet, online collaboration and information sharing are pervasive in enterprise computing environment. With regard to the requirements of online collaboration and information sharing, au...
 
CrowdHelp: application for improved emergency response through crowdsourced information
Found in: Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication (UbiComp '13 Adjunct)
By Alfred C. Weaver, Liliya I. Besaleva
Issue Date:September 2013
pp. 1437-1446
Emergency resources are often insufficient to satisfy fully the demands for professional help and supplies after a public disaster. Furthermore, in a mass casualty situation, the emphasis shifts from ensuring the best possible outcome for each individual p...
     
Learning to rank results in relational keyword search
Found in: Proceedings of the 20th ACM international conference on Information and knowledge management (CIKM '11)
By Alfred C. Weaver, Joel Coffman
Issue Date:October 2011
pp. 1689-1698
Keyword search within databases has become a hot topic within the research community as databases store increasing amounts of information. Users require an effective method to retrieve information from these databases without learning complex query languag...
     
A framework for evaluating database keyword search strategies
Found in: Proceedings of the 19th ACM international conference on Information and knowledge management (CIKM '10)
By Alfred C. Weaver, Joel Coffman
Issue Date:October 2010
pp. 729-738
With regard to keyword search systems for structured data, research during the past decade has largely focused on performance. Researchers have validated their work using ad hoc experiments that may not reflect real-world workloads. We illustrate the wide ...
     
Structured data retrieval using cover density ranking
Found in: Proceedings of the 2nd International Workshop on Keyword Search on Structured Data (KEYS '10)
By Alfred C. Weaver, Joel Coffman
Issue Date:June 2010
pp. 1-6
Keyword search in structured data is an important problem spanning both the database and IR communities. As social networking, microblogging, and other data-driven websites store increasing amounts of information in relational databases, users require an e...
     
Electronic commerce virtual laboratory
Found in: Proceedings of the 41st ACM technical symposium on Computer science education (SIGCSE '10)
By Alfred C. Weaver, Joel Coffman
Issue Date:March 2010
pp. 92-96
Website security is essential for successful e-commerce ventures, but the vital "how-to" components of security are often lacking in academic courses. This paper describes our attempt to instill an awareness of security concerns and techniques by having th...
     
Using web service enhancements to bridge business trust relationships
Found in: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services (PST '06)
By Alfred C. Weaver, Zhengping Wu
Issue Date:October 2006
pp. 263-266
1. With the development of web technology and distributed systems, online collaborations are becoming more common and more demanding. These collaborations require online business trust relationships among collaborating organizations. Online business trust ...
     
Requirements of federated trust management for service-oriented architectures
Found in: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services (PST '06)
By Alfred C. Weaver, Zhengping Wu
Issue Date:October 2006
pp. 263-266
With the emergence of an effective infrastructure supporting Grid Computing and Web Services, service-oriented computing has been growing over the last few years, and service-oriented architectures are becoming an important computing paradigm. When differe...
     
Token-based dynamic trust establishment for web services
Found in: Proceedings of the 43rd annual southeast regional conference - Volume 2 (ACM-SE 43)
By Alfred C. Weaver, Zhengping Wu
Issue Date:March 2005
pp. 217-222
Despite recent advances in trust relationship control mechanisms, issues remain that impede the development of effective trust models. One of these is the lack of dynamic mechanisms that can simultaneously achieve both privacy and efficiency when establish...
     
On implementing the OSI model in Ada via tasking
Found in: Proceedings of the fifth Washington Ada symposium on Ada (WADAS '88)
By Alfred C. Weaver, Norman R. Howes
Issue Date:July 1988
pp. 103-108
Electronic conversations often seem less polite than spoken conversations. The usual explanation for this is that people who are not physically copresent become depersonalized and less inhibited by social norms. While this explanation is intuitively appeal...
     
Design of a microcomputer laboratory for teaching computer science
Found in: Proceedings of the twelfth SIGCSE technical symposium on Computer science education (SIGCSE '81)
By Alfred C. Weaver
Issue Date:February 1981
pp. 132-137
On the premise that many of the fundamental concepts of computer science can be better taught in a hands-on, dedicated computing environment (i.e., a microcomputer), as opposed to a large multi-purpose system in which the student is insulated from the mach...
     
Using microcomputers to teach computer science
Found in: Proceedings of the tenth SIGCSE technical symposium on Computer science education (SIGCSE '79)
By Alfred C. Weaver
Issue Date:January 1979
pp. 141-143
This paper reports the author's progress toward developing a microcomputer laboratory suitable for teaching some of the basic concepts of computer science. The rationale for this approach is presented, followed by a description of the hardware and software...
     
A real-time, multi-task programming language for microprocessor-based industrial process control
Found in: Proceedings of the 1978 annual conference - Volume 2 (ACM '78)
By Alfred C. Weaver
Issue Date:January 1978
pp. 522-525
This paper presents an overview of the design of a real-time programming language whose purpose is to permit an inexperienced programmer to quickly and efficiently implement control of multiple, parallel industrial processes. The programming language is co...
     
VIPTRAN - A programming language and its compiler for Boolean Systems
Found in: Proceedings of the annual conference (ACM'73)
By Alfred C. Weaver
Issue Date:August 1973
pp. 428.3-429
The solution of some industrial process control problems can be expressed as a system of Boolean algebra equations using variables representing inputs from and outputs to the real world. If this system is solved sequentially, cyclically, and in real time, ...
     
 1